Schakel uit AutoPlay voor ALL drives - voorkomt automatic malware execution from USB/removable media (classic attack vector).
Aanbeveling
IMPLEMENT
Risico zonder
High
Risk Score
7/10
Implementatie
2u (tech: 1u)
Van toepassing op:
β Windows 10 β Windows 11
AutoPlay = USB malware delivery: Attack: Malicious USB stick (dropped in parking lot, mailed to office), User: Inserts USB β AutoPlay: Automatically runs autorun.inf β malware executes (NO user interaction), Malware: Ransomware, credential stealer, backdoor. Reality: Stuxnet (2010) used USB AutoPlay, still common attack vector (social engineering + USB). Defense: Schakel uit AutoPlay β user must manually browse USB β malware NOT auto-executed.
PowerShell Modules Vereist
Primary API: Microsoft Graph API Connection:Connect-MgGraph Required Modules: Microsoft.Graph.DeviceManagement
Implementatie
Schakel uit AutoPlay: All drives: USB, CD/DVD, network drives, Policy: Turn off AutoPlay: Enabled (all drives), User experience: Insert USB β NO automatic action β user opens File Explorer manually. Exception: NONE (no legitimate business need voor AutoPlay).
Vereisten
Intune subscription
Windows 10/11
Implementatie
Intune Settings Catalog: AutoPlay Policies β Turn off AutoPlay: Enabled (All drives). Effect: No automatic USB execution.
Compliance
CIS Windows Benchmark L1, BIO 12.02, ISO 27001 A.12.2.1, NIST SI-3.
Monitoring
Gebruik PowerShell-script autoplay-disabled.ps1 (functie Invoke-Monitoring) β Controleren.
Remediatie
Gebruik PowerShell-script autoplay-disabled.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
CIS M365: Control Windows - AutoPlay (L1) -
BIO: 12.02.01 -
ISO 27001:2022: A.12.2.1 -
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).